ZDNet

Displaying 1 - 10 of 21 results

  • IT TREND INSIGHTS 2013: How the Cloud Will Impact Storage and Security

    Research // Oct 2013 // provided by ZDNet

    According to this ZDNet IT Trend Insights report sponsored by Dell, IT managers must look beyond the simple bits and bytes of system configuration and take on a more global view of cloud strategy and trends -- especially cloud computing, compliance, big data and BYOD. In this report, see ...

    Download Now
  • BlackBerry 10: A smartphone beginning or end?

    Research // Feb 2013 // provided by ZDNet

    With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products. ...

    Read more
  • Mobile security: Defending your devices

    Research // Nov 2012 // provided by ZDNet

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at ...

    Read more
  • Emerging threats: How to protect your business

    Research // Nov 2012 // provided by ZDNet

    IT security risks are increasing in number and growing in sophistication. Not only are external threats - such as distributed denial of service (DDoS) attacks and viruses - continuing to evolve, but so are new risks from both outside the business and within. All of this is making enterprises take ...

    Download Now
  • Windows 8: From preview to release

    Research // Oct 2012 // provided by ZDNet

    It's been over three years since Microsoft released Windows 7, and its new desktop OS is about to take its first steps in the big wide world. Along with Microsoft Surface and Windows Server 2012, ZDNet has followed Windows 8 all the way from Developer Preview to Release To Manufacturing. ...

    Read more
  • Alan Turing: A modern computing legacy

    Research // Jul 2012 // provided by ZDNet

    The world would be a different place if not for Alan Turing. A mathematician and cryptographer, Turing's work at Bletchley Park heavily contributed to the Allied war effort and had profound consequences in shortening World War II. His pioneering 'stored program' computer underpins every computer today, and he has influenced ...

    Read more
  • London Games: Planning a business and IT strategy

    Research // Jul 2012 // provided by ZDNet

    As the Games come to London, organisers have also been urging businesses to be ready with contingency plans, from home working to IT infrastructure. This business and IT guide to the London Games looks at how businesses are preparing for outages and improvements, how London workers and IT support will ...

    Download Now
  • Amazon Web Services: A guide to Amazon's cloud

    Research // Jun 2012 // provided by ZDNet

    Amazon launched its cloud in 2006 and since then it has come to dominate the industry. Amazon's APIs are a de facto standard, as almost any popular start-up you care to name has used its services. Enterprises are piling into its low-cost infrastructure-as-a-service technology for anything from basic storage to ...

    Read more
  • SharePoint 2010: A guide to migration

    Research // Jun 2012 // provided by ZDNet

    How do you take a product that is so new nobody knows much about it, and get it ready for deployment over a large organisation? Robert Schifreen faced this task when SharePoint 2010 was chosen for the University of Brighton, and he was asked to make it work. From ...

    Read more
  • Insider threats: Defending against costly breaches

    Research // Jun 2012 // provided by ZDNet

    A worker leaves an unsecured laptop on a train. A nurse provides patient details to her partner, who works at an accident management company. Before handing in his notice, a system administrator misuses his privileged access to take company data. Insider threats like these can hurt businesses just as much ...

    Download Now